Millennials: Why Customer Service Will Never Be The Same
CIOs: Adopt Social Media For Success, Now
3D Fingerprint Scanners Can Secure Smartphones
CIOs Need To Embrace Agile, Gartner Finds
Windows 10 Build 10159 Marks Microsoft Efficiency
News & Commentary
Casio Entering Smartwatch Fray
Eric Zeman,
Commentary
Casio plans to make a smartwatch for outdoorsy men that it will release in March 2016.
By Eric Zeman , 7/2/2015
Comment0 comments  |  Read  |  Post a Comment
How To Use Data To Outsmart Your Competitors
Lisa Morgan, Freelance Writer
News
The pressure's on to use data to outsmart your competitors. Here are six ways companies can use data to imagine and even re-imagine what's possible.
By Lisa Morgan Freelance Writer, 7/2/2015
Comment0 comments  |  Read  |  Post a Comment
In The Cyber Realm, Letís Be Knights Not Blacksmiths
Jeff Schilling, CSO, Firehost
Commentary
Why the Internet of Things is our chance to finally get information security right.
By Jeff Schilling CSO, Firehost, 7/2/2015
Comment0 comments  |  Read  |  Post a Comment
10 Great Geek Getaways For Summer
Nathan Eddy, Freelance Writer
News
Longing to get away this summer but more interested in the Shire than St. Barths? Check out our guide to geek-tastic vacations worldwide.
By Nathan Eddy Freelance Writer, 7/2/2015
Comment0 comments  |  Read  |  Post a Comment
CIOs Need To Embrace Agile, Gartner Finds
Larry Loeb, Blogger, Informationweek
Commentary
A new Gartner report finds that CIOs need to embrace agile development, and the firm offers 10 principles to guide this change.
By Larry Loeb Blogger, Informationweek, 7/2/2015
Comment0 comments  |  Read  |  Post a Comment
11 Top Resources For Women in Technology
Crystal Bedell, freelance writer
News
Working as a woman in IT doesn't have to be isolating. We've compiled the best organizations for women to connect with their peers, learn about career advancement, and receive the support to persevere.
By Crystal Bedell freelance writer, 7/2/2015
Comment0 comments  |  Read  |  Post a Comment
3D Fingerprint Scanners Can Secure Smartphones
David Wagner, Executive Editor, Community & IT Life
News
Professors from UC Berkeley and UC Davis have developed a new way of reading fingerprints that allows for a 3D scan, rather than the traditional 2D scan. In theory, this should make fingerprint authentication on mobile devices harder to fool.
By David Wagner Executive Editor, Community & IT Life, 7/2/2015
Comment0 comments  |  Read  |  Post a Comment
CIOs: Adopt Social Media For Success, Now
Jonathan Feldman, CIO, City of Asheville, NC
Commentary
Social Media enhances learning, develops needed contacts, speeds problem-solving, and helps you create business transformation.
By Jonathan Feldman CIO, City of Asheville, NC, 7/2/2015
Comment0 comments  |  Read  |  Post a Comment
Hyperconverged Infrastructure Taking Off
Marcia Savage, Managing Editor, Network Computing
News
US businesses are rapidly adopting hyperconverged systems as a way to streamline IT and storage operations, and in some cases as a bridge to software-defined storage, researchers find.
By Marcia Savage Managing Editor, Network Computing, 7/2/2015
Comment0 comments  |  Read  |  Post a Comment
Containers: What IT Pros Should Consider
Azmi Jafarey, Network Computing Author
Commentary
Containerization is a hot technology that IT teams can't afford to ignore. Here are some basic facts to know plus benefits and risks to weigh.
By Azmi Jafarey Network Computing Author, 7/2/2015
Comment4 comments  |  Read  |  Post a Comment
Smart Cities' 4 Biggest Security Challenges
Sara Peters, Senior Editor at Dark Reading
News
The messiness of politics and the vulnerability of the Internet of Things in one big, unwieldy package.
By Sara Peters Senior Editor at Dark Reading, 7/1/2015
Comment2 comments  |  Read  |  Post a Comment
PCI Update Paves Way For Expanding Point-to-Point Encryption
Jai Vijayan, Freelance writer
News
Move appears designed mainly for large organizations and big-box retailers looking to lock down payment card security.
By Jai Vijayan Freelance writer, 7/1/2015
Comment3 comments  |  Read  |  Post a Comment
iPhone 6s Casing Photos Leak, Show Few Changes
Nathan Eddy, Freelance Writer
Commentary
If leaked photos can be believed, Apple is planning only minor changes for the upcoming iPhone 6s.
By Nathan Eddy Freelance Writer, 7/1/2015
Comment1 Comment  |  Read  |  Post a Comment
AWS Outage Traced To Route Leak
Network Computing Editors,
News
Netflix and other sites knocked offline Tuesday after route leak at a service provider causes Amazon Web Services outage.
By Network Computing Editors , 7/1/2015
Comment0 comments  |  Read  |  Post a Comment
Windows 10 Build 10159 Marks Microsoft Efficiency
Kelly Sheridan, Associate Editor, InformationWeek
News
Microsoft has released Windows 10 Build 10159 to the Fast ring of Windows Insiders, marking the second PC build in two days.
By Kelly Sheridan Associate Editor, InformationWeek, 7/1/2015
Comment1 Comment  |  Read  |  Post a Comment
Cisco-OpenDNS May Upset Networking Ecosystem
Russ White, Principal Engineer, IPOS, Ericsson
Commentary
Cisco's acquisition of security provider OpenDNS is a symptom of the vendor's transition to services that could have wide partner and competitor repercussions.
By Russ White Principal Engineer, IPOS, Ericsson, 7/1/2015
Comment1 Comment  |  Read  |  Post a Comment
Skype For Business: New Features Ready To Preview
Kelly Sheridan, Associate Editor, InformationWeek
News
Enterprise customers on Office 365 can preview new Skype for Business features, including broadcast and voice dial-in capabilities.
By Kelly Sheridan Associate Editor, InformationWeek, 7/1/2015
Comment1 Comment  |  Read  |  Post a Comment
iOS 8.4, Mac OS X Updates Plug Vulnerabilities
Eric Zeman,
Commentary
Apple released its iOS 8.4 and Mac OS X 10.10.4 updates that add Apple Music and tackle a range of security problems.
By Eric Zeman , 7/1/2015
Comment0 comments  |  Read  |  Post a Comment
Why We Need In-depth SAP Security Training
Juan Pablo Perez-Etchegoyen, CTO, Onapsis
Commentary
SAP and Oracle are releasing tons of patches every month, but are enterprises up to this complex task? I have my doubts.
By Juan Pablo Perez-Etchegoyen CTO, Onapsis, 7/1/2015
Comment1 Comment  |  Read  |  Post a Comment
How Public Cloud Providers Rain On Users
Larry Loeb, Blogger, Informationweek
News
A Forrester study finds corporate customers are largely dissatisfied with their primary public cloud providers.
By Larry Loeb Blogger, Informationweek, 7/1/2015
Comment2 comments  |  Read  |  Post a Comment
More Stories
PR Newswire
Apple Watch Gets Email, IT Support
Eric Zeman 6/29/2015
Samsung's Transparent Trucks: Clearly A New Reality
David Wagner, Executive Editor, Community & IT Life,  6/26/2015
How To Keep Your Job From Ruining Your Vacation
David Wagner, Executive Editor, Community & IT Life,  6/26/2015
Register for InformationWeek Newsletters
White Papers
Current Issue
Building a Mobile Business Mindset
Building a Mobile Business Mindset
The differences between mobile apps and conventional Windows clients, or even web applications, are far more than skin deep. Yes, the touch-versus-keyboard interface, APIs, and programming languages are new, but thatís arguably the easy part. There are profound differences in how the two are built, the functionality each prioritizes, the release cycles on which theyíre developed ó even the attitudes, values, and work styles of the developers creating them.
Steal Our Slides
Dark Reading Threat Intelligence Survey
Dark Reading Threat Intelligence Survey
Threat intelligence is the best way to stay ahead of new and complex attacks, say survey respondents. How analytics influences their IT security strategies varies.
Video
Sponsored Video
Slideshows
Twitter Feed
InformationWeek Radio
Archived InformationWeek Radio
Join us for a roundup of the top stories on InformationWeek.com for the week of June 21, 2015.